/openbmc/linux/crypto/asymmetric_keys/ |
H A D | pkcs7_verify.c | 177 sinfo->signer = x509; in pkcs7_find_key() 197 struct x509_certificate *x509 = sinfo->signer, *p; in pkcs7_verify_sig_chain() 217 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_verify_sig_chain() 240 x509->signer = x509; in pkcs7_verify_sig_chain() 294 x509->signer = p; in pkcs7_verify_sig_chain() 335 if (!sinfo->signer) in pkcs7_verify_one() 339 sinfo->signer->index, sinfo->index); in pkcs7_verify_one() 346 if (sinfo->signing_time < sinfo->signer->valid_from || in pkcs7_verify_one() 347 sinfo->signing_time > sinfo->signer->valid_to) { in pkcs7_verify_one() 354 ret = public_key_verify_signature(sinfo->signer->pub, sinfo->sig); in pkcs7_verify_one()
|
H A D | pkcs7_trust.c | 38 for (x509 = sinfo->signer; x509; x509 = x509->signer) { in pkcs7_validate_trust_one() 68 if (x509->signer == x509) { in pkcs7_validate_trust_one() 127 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_validate_trust_one()
|
H A D | pkcs7_parser.h | 19 struct x509_certificate *signer; /* Signing certificate (in msg->certs) */ member
|
H A D | x509_parser.h | 14 struct x509_certificate *signer; /* Certificate that signed this one */ member
|
/openbmc/openbmc/poky/meta/recipes-core/meta/ |
H A D | signing-keys.bb | 28 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND')) 29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'), 34 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND')) 35 signer.export_pubkey(os.path.join(d.expand('${B}'), 'ipk-key'), 40 signer = get_signer(d, d.getVar('PACKAGE_FEED_GPG_BACKEND')) 41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'),
|
/openbmc/qemu/scripts/ |
H A D | get_maintainer.pl | 1251 foreach my $signer (@signature_lines) { 1252 $signer = deduplicate_email($signer); 1765 my $signer = $signers[0]; 1767 $signer = deduplicate_email($signer); 1770 foreach my $ref(@{$commit_signer_hash{$signer}}) { 1779 push(@{$commit_signer_hash{$signer}}, 1842 foreach my $signer (@signers) { 1843 $signer = deduplicate_email($signer); 1949 foreach my $signer (@signers) { 1950 $signer = deduplicate_email($signer); [all …]
|
/openbmc/linux/scripts/ |
H A D | get_maintainer.pl | 1577 foreach my $signer (@signature_lines) { 1578 $signer = deduplicate_email($signer); 1760 foreach my $signer (@commit_signers) { 1761 $signer = deduplicate_email($signer); 2136 my $signer = $signers[0]; 2138 $signer = deduplicate_email($signer); 2141 foreach my $ref(@{$commit_signer_hash{$signer}}) { 2150 push(@{$commit_signer_hash{$signer}}, 2225 foreach my $signer (@signers) { 2226 $signer = deduplicate_email($signer); [all …]
|
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | verified-boot.txt | 25 Images are signed using a private key known only to the signer, but can 46 | signer | * | U-Boot | 62 The public key from the signer allows us to verify and therefore trust 73 The above method works for a signer providing images to a run-time U-Boot. 76 1. Master private key is used by the signer to sign a first-stage image.
|
H A D | signature.txt | 84 allow the signer to operate. These should be added to the .its file. 103 - signer-name: Name of the signer (e.g. "mkimage") 105 - signer-version: Version string of the signer (e.g. "2013.01") 107 - comment: Additional information about the signer or image 119 For config bindings, these properties are added by the signer: 121 - hashed-nodes: A list of nodes which were hashed by the signer. Each is
|
H A D | beaglebone_vboot.txt | 397 signer-version 398 signer-name
|
/openbmc/u-boot/scripts/ |
H A D | get_maintainer.pl | 1538 foreach my $signer (@signature_lines) { 1539 $signer = deduplicate_email($signer); 2071 my $signer = $signers[0]; 2073 $signer = deduplicate_email($signer); 2076 foreach my $ref(@{$commit_signer_hash{$signer}}) { 2085 push(@{$commit_signer_hash{$signer}}, 2160 foreach my $signer (@signers) { 2161 $signer = deduplicate_email($signer); 2323 foreach my $signer (@signers) { 2324 $signer = deduplicate_email($signer); [all …]
|
/openbmc/openbmc/poky/meta/classes/ |
H A D | sign_ipk.bbclass | 51 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND')) 55 signer.detach_sign(ipk_to_sign,
|
H A D | sign_rpm.bbclass | 62 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND')) 65 signer.sign_rpms(rpms,
|
/openbmc/openbmc/poky/meta/lib/oe/package_manager/rpm/ |
H A D | __init__.py | 17 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 19 signer = None 27 if signer: 30 signer.detach_sign(os.path.join(deploy_dir, 'repodata', 'repomd.xml'), 132 signer = get_signer(self.d, self.d.getVar('RPM_GPG_BACKEND')) 134 signer.export_pubkey(pubkey_path, self.d.getVar('RPM_GPG_NAME'))
|
/openbmc/openbmc-tools/cla-signers/ |
H A D | README.md | 1 # Greppable CLA signer list
|
/openbmc/openbmc/poky/meta/lib/oe/package_manager/ipk/ |
H A D | __init__.py | 22 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 24 signer = None 57 if signer: 61 signer.detach_sign(f,
|
/openbmc/openbmc/poky/meta/lib/oe/package_manager/deb/ |
H A D | __init__.py | 87 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND')) 89 signer = None 90 if signer: 92 signer.detach_sign(f,
|
/openbmc/openbmc/meta-security/recipes-security/opendnssec/ |
H A D | opendnssec_2.1.10.bb | 1 SUMMARY = "OpenDNSSEC is a policy-based zone signer that automates the process of keeping track of …
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 265 + X509 *signer = NULL; 266 + if (OCSP_resp_get0_signer(bs, &signer, NULL) == 1) { 267 + return WvX509(X509_dup(signer));
|
/openbmc/openbmc/poky/meta/classes-global/ |
H A D | sstate.bbclass | 383 signer = get_signer(d, 'local') 384 if not signer.verify(sstatepkg + '.sig', d.getVar("SSTATE_VALID_SIGS")): 850 signer = get_signer(d, 'local') 851 signer.detach_sign(str(tmp_pkg), d.getVar('SSTATE_SIG_KEY'), None,
|
/openbmc/linux/Documentation/process/ |
H A D | submitting-patches.rst | 459 The Signed-off-by: tag indicates that the signer was involved in the
|